Slideshare uses cookies to improve functionality and performance, and to provide you with relevant advertising. If you continue browsing the site, you agree to the use of cookies on this website. See our User Agreement and Privacy Policy.

Slideshare uses cookies to improve functionality and performance, and to provide you with relevant advertising. If you continue browsing the site, you agree to the use of cookies on this website. See our Privacy Policy and User Agreement for details.

4.
UNESCO Chair in Data Privacy Universal Declaration of Human Rights (1948) – “No one shall be subjected to arbitrary interference with his privacy, family, home or correspondence, nor to attacks upon his honour and reputation. Everyone has the right to the protection of the law against such interference or attacks” Data privacy technologies are about technically enforcing the above right in the information societyTowards a Trustworthy Privacy in Pervasive Video Surveillance Systems

5.
UNESCO Chair in Data Privacy Unfortunately… – Lack of awareness of the population on the existing privacy threats (profiling, tracking, etc.) – Large companies and the “Big Brother” effect – Lack of comprehensive legislationTowards a Trustworthy Privacy in Pervasive Video Surveillance Systems

6.
UNESCO Chair in Data Privacy Chair aims and goals – Promote the adoption of privacy-preserving technologies by governments and private sectors (telecoms, banks, etc.) – Raise the public awareness of the need and the right to preserve the privacy of the individuals – Promote cross-national research on privacy technologies We are mainly focused on technologiesTowards a Trustworthy Privacy in Pervasive Video Surveillance Systems

12.
Trustworthy ICT? The goal of VS is security Security vs privacy... – Is people happy while being monitored? – Does people feel safe while being under surveillance?Towards a Trustworthy Privacy in Pervasive Video Surveillance Systems

13.
Trustworthy ICT? Is technology reliable? – “The degree to which a trustor has a justifiable belief that the trustee will provide the expected function or service” Technology problems? Owner misbehaviors? – Are individuals protected by the law? Lack of legislation can certainly slow down the social acceptance of ICT Social acceptance vs. User collaboration – Web 2.0 trust is based on collaboration of usersTowards a Trustworthy Privacy in Pervasive Video Surveillance Systems

16.
(I) Technology: algorithms and platform In the case of VS, computer vision techniques... – Must work in real time. If the technique needs some temporary storage of the raw video, a security leak of the information system can compromise the privacy of the individuals. – Must perform well in terms of accuracy. (i) Must detect ALL the ROIs (e.g. Faces). (ii) Should not need human supervision.Towards a Trustworthy Privacy in Pervasive Video Surveillance Systems

17.
(I) Technology: algorithms and platform Fortunately... – There are techniques to detect ROIs in realtime – And capable of detecting them correctly! But... – Camera conditions are essential: fixed cameras, good illumination conditions, etc. – Some of the literature does not tackle these issues! – Some of the proposals blur ROIs in the pixel domain and raw video is stored and accessible to authorized users.Towards a Trustworthy Privacy in Pervasive Video Surveillance Systems

20.
Law enforcement Directive 95/46/EC on the protection of individuals with regard to the processing of personal data and on the free movement of such data – Any information relating to an identified or identifiable natural person can be seen as personal data – A picture can be considered personal data if it allows identification of individualsTowards a Trustworthy Privacy in Pervasive Video Surveillance Systems

21.
Law enforcement Spanish legislation – Surveillance must be advertised – The owner must take the necessary precautions to ensure the safety of the images and prevent alteration, loss or unauthorized access – Data cannot be released to third parties Does the owner behave properly?Towards a Trustworthy Privacy in Pervasive Video Surveillance Systems

22.
Law enforcement A trust score for VS IMAGE PROTECTION DATA ACCESS High trust + notification High trust. ROIs are In case of identification hidden, no supervision / no real time High trust. Anyone accesses the protected data, auhorized users access original data. Low trust. ROIs are hidden, Low trust. Only but human supervision is authorized users can needed / no real time access ALL THE DATA No trust. ROIs are not No trust. Anyone can hidden access the original dataTowards a Trustworthy Privacy in Pervasive Video Surveillance Systems

23.
Law enforcement IMAGE PROTECTION LOW DATA ACCESS HIGH Data is protected and sent to SECURITAS. Original data is only available to police.Towards a Trustworthy Privacy in Pervasive Video Surveillance Systems